[KEYGEN] Look Inside


(pico) #1

You already know how it goes. Post 3 unique keys on the comments and get you Challenge Solver Badge. Badges will be available until the first keygen/writeup is released. Please use the spoiler tag for keygens and writeups (unless you post them in a new topic).

This is an experiment so I hope it works fine. Let me know if you have any issue.

You need to download the original image. Click in the image and download the one that pops up

[PATCHME] Look Deeper Inside
Writeup - Look Inside

i didn’t get 2nd hint -.-

(pico) #5

You need to find the binary first. If you got the first hint… just look inside :slight_smile:


the thing is that i wasnt able to find smth that converts images to different kind of depth and alphas

(0x00Jinx) #7

The binary does indeed extract just fine

(pico) #8

@0n3D3y on Linux you can use imageMagick or GIMP.

convert is actually one of the programs that comes with ImageMagick…


Thank you, had lots of fun! :smiley:

2-VM-4-ME$ : EV-$.ZGJ4$
ydoIdodis$ : so-$eZG}o$
keygen-fun : uy-$fZGdn$

(pico) #10

Congrats @Leeky :trophy:
You’ve got the first badge!

Looking at your first key I assume you haven’t reversed the whole thing…:wink:

(Dark Sider) #11

Found the location of the second hint… But I have literally no idea what to do with all that stuff… Is this at all possible on windows or am I barking up the wrong tree?


I’m sure it’s possible on Windows, but you will be limited to static analysis.
You are likely better off just doing it in *nix.
I will offer a couple hints, though:

Hint 1:

This is a crackme, so you are looking for a binary executable.
The first hint is a command that will give you the next layer of steganography.

Hint 2:

The second hint doesn’t come into play until you have an actual ELF file you can execute and examine.

Also, if anybody else had trouble extracting and converting a certain part of a certain file during the stego part of the challenge, here’s my (bad) solution (this is a much more spoilery hint!):

I installed Jeex, a hex editor, then viewed the second image in ASCII and copied it to a text file.
Then, I trimmed all the whitespace and the single character that isn’t part of that alphabet’s encoding and was able to decode it.

I wasn’t able to do this from the terminal, so if one of you wizards would like to pm me their one-liners for this part of the extraction, that would be awesome.

(pico) #13